tinect/oauth2-storefront-login

Adds OAuth2/OIDC login support to the Shopware 6 storefront (Microsoft, Google, GitHub, generic OIDC)

Maintainers

Package info

github.com/tinect/TinectOAuth2StorefrontLogin

Type:shopware-platform-plugin

pkg:composer/tinect/oauth2-storefront-login

Statistics

Installs: 2

Dependents: 0

Suggesters: 0

Stars: 2

Open Issues: 0

2.1.1 2026-03-25 12:32 UTC

This package is auto-updated.

Last update: 2026-03-25 13:20:58 UTC


README

Adds OAuth2 / OpenID Connect login to the Shopware 6 storefront. Customers can sign in with GitHub, Microsoft Entra ID, Google, or any OpenID Connect provider, and can connect or disconnect providers from their account profile.

Requirements

  • Shopware ~6.6.0||~6.7.0

Installation

composer require tinect/oauth2-storefront-login
bin/console plugin:install --activate TinectOAuth2StorefrontLogin
bin/console cache:clear

Configuration

Open the Shopware Administration and navigate to Settings → Plugins → OAuth Storefront Login.

Create one entry per provider you want to offer:

Field Description
Name Label shown on the login button (e.g. GitHub)
Provider GitHub, OpenID Connect, Microsoft Entra ID, or Google Mail
Active Toggle to enable/disable the button on the login page
Connect only When enabled the provider will not create new customer accounts — it can only be used to link an existing account from the profile page
Require email verification on login When enabled, a key-based login only succeeds if the email address returned by the provider also matches the linked customer account. Useful for providers that always supply a verified email (e.g. Google, Microsoft), and also when the shop owner needs to retain control over which email addresses are used, ensuring customers cannot bypass email policies through OAuth login.
Update email address on every login When enabled, the customer's email address in Shopware is updated to match the provider's email on each login. Useful when the provider (e.g. corporate SSO) is the authoritative source for email addresses.
Disable password login When enabled, customers who have a connected account with this provider can no longer log in using their email and password — they must use this OAuth provider instead.
Hide login button When enabled, the login button for this provider is not shown on the storefront login page. The provider can still be used to connect accounts from the customer profile page.

GitHub

  1. Go to GitHub → Settings → Developer settings → OAuth Apps → New OAuth App.
  2. Set Authorization callback URL to https://your-shop.example.com/account/oauth/{clientId}/callback (replace {clientId} with the UUID shown in the admin after saving).
  3. Copy Client ID and Client Secret into the plugin settings.

OpenID Connect

Field Description
Client ID Your OIDC client ID
Client Secret Your OIDC client secret
Discovery Document URL e.g. https://accounts.google.com/.well-known/openid-configuration — endpoints are fetched automatically when this is set
Authorization / Token / Userinfo Endpoint Fill only if you are not using a discovery document
Scopes Space-separated, defaults to openid email profile

The callback URL to register with your provider is https://your-shop.example.com/account/oauth/{clientId}/callback.

Login flow

Customer → "Continue with GitHub" button
    → GET /account/oauth/{clientId}          (store state + intent in session, redirect to provider)
    → provider authorization page
    → GET /account/oauth/{clientId}/callback (validate state, exchange code, resolve customer)
    → account home page

Customer resolution order:

  1. Existing OAuth key mapping → login directly
    • If Require email verification on login is enabled: the key mapping is only accepted when the provider's email also matches the linked customer — prevents access if an OAuth key is reused by someone with a different email address
    • If Update email address on every login is enabled: the customer's email in Shopware is updated to the provider's email (only if different)
  2. Active customer with matching e-mail → link and login
  3. No match + registration allowed → register new customer, link, login
  4. No match + connectOnly enabled → error, redirect to login page

Administration

OAuth Clients

Manage providers under Settings → Plugins → OAuth Storefront Login.

The View Connections button opens a dedicated list of all active customer–provider connections across the shop, showing customer number, name, email, provider name, provider type, and the date the connection was established. Connections can be removed directly from this list.

Customer detail

Each customer's detail page shows a Connected OAuth Providers card listing all providers linked to that account. Connections can also be removed from there.

Account connect / disconnect

Logged-in customers can manage connected providers on the Account → Profile page. Each active provider is shown with a Connect or Disconnect button.

Customer → "Connect with GitHub" button
    → GET /account/oauth/{clientId}/connect           (_loginRequired, stores connect intent)
    → provider authorization page
    → GET /account/oauth/{clientId}/callback          (same endpoint as login, intent from session)
    → profile page (success flash)

Customer → "Disconnect" button
    → POST /account/oauth/{clientId}/disconnect       (_loginRequired)
    → profile page (success flash)

Adding a custom provider

  1. Create a class that extends Tinect\OAuth2StorefrontLogin\Contract\ClientProviderContract:
use Tinect\OAuth2StorefrontLogin\Contract\ClientContract;
use Tinect\OAuth2StorefrontLogin\Contract\ClientProviderContract;
use Symfony\Component\OptionsResolver\OptionsResolver;

final class MyProviderClientProvider extends ClientProviderContract
{
    public function provides(): string
    {
        return 'my_provider';
    }

    public function getConfigurationTemplate(): OptionsResolver
    {
        $resolver = parent::getConfigurationTemplate();
        $resolver->setRequired(['clientId', 'clientSecret']);
        $resolver->setAllowedTypes('clientId', 'string');
        $resolver->setAllowedTypes('clientSecret', 'string');
        return $resolver;
    }

    public function provideClient(array $resolvedConfig): ClientContract
    {
        return new MyProviderClient($resolvedConfig);
    }
}
  1. The class is auto-tagged via _instanceof: ClientProviderContract — no service registration needed.

  2. Add an admin Vue.js component named tinect-oauth-provider-my-provider-settings (kebab-case of my_provider) to render the config fields, and import it in main.js.

Routes

Name Path Method
widgets.tinect.oauth.redirect /account/oauth/{clientId} GET
widgets.tinect.oauth.connect /account/oauth/{clientId}/connect GET
tinect.oauth.callback /account/oauth/{clientId}/callback GET
widgets.tinect.oauth.disconnect /account/oauth/{clientId}/disconnect POST

Events

The plugin dispatches the following events that you can subscribe to:

Event class Fired when
OAuthCustomerRegisteredEvent A new customer account was created via OAuth
OAuthCustomerConnectedEvent A customer explicitly connected a provider from their profile
OAuthCustomerDisconnectedEvent A customer disconnected a provider from their profile
OAuthCustomerEmailUpdatedEvent A customer's email was updated on login (requires Update email address on every login)
OAuthCustomerEmailUpdateConflictEvent Email update was skipped because the new email is already used by another account

All events are in the Tinect\OAuth2StorefrontLogin\Event namespace.

Data Protection (GDPR / DSGVO)

Disclaimer: This section is provided as a technical orientation for shop operators and is neither complete nor legally binding. It does not constitute legal advice. Data protection requirements depend on your specific setup, jurisdiction, and business context. Always consult a qualified legal professional before publishing or updating your privacy policy.

This section helps shop operators understand what personal data the plugin processes so they can update their privacy policy accordingly.

Data stored by the plugin

The plugin creates one database record per customer–provider connection (tinect_oauth_storefront_customer_key):

Field Content
customer_id Reference to the Shopware customer
client_id Reference to the configured OAuth provider
primary_key The provider-side user identifier (e.g. GitHub user ID, OIDC sub claim)
created_at / updated_at Timestamps

Name and e-mail address are stored in the standard Shopware customer table — not in any plugin-specific table.

Access tokens are never persisted. They are only held in memory for the duration of a single request.

Data received from third-party providers

During login the plugin contacts the provider's API server-side to exchange the authorisation code and retrieve the user's profile. The following providers are built in:

Provider API endpoint Remarks
GitHub api.github.com (USA) Data transfer to a third country; cover via EU–US DPF or SCCs
Google Mail accounts.google.com EU–US DPF
Microsoft Entra ID Configurable (Azure) EU data centres available depending on tenant configuration
OpenID Connect (generic) Configurable Depends on the provider chosen by the shop operator

Deletion

When a customer account is deleted from Shopware, all associated OAuth keys are deleted automatically via ON DELETE CASCADE. Customers can also disconnect individual providers themselves from their account profile page.

Note on registration consent

When the plugin automatically creates a new customer account, it sets acceptedDataProtection = true internally so that Shopware accepts the registration. The plugin does not display a consent checkbox during the OAuth flow. Shop operators must ensure that consent to the privacy policy is obtained before the customer initiates the OAuth login — for example by adding a checkbox or notice to the storefront login template.

What to mention in your privacy policy

  • That customers can log in via third-party OAuth providers (list the ones you have configured).
  • Which personal data is received from each provider (e-mail address, name, provider user ID).
  • That the provider user ID is stored to maintain the login connection.
  • If Update email address on every login is enabled: that the e-mail address stored in the shop may be updated on each login to reflect the provider's current value.
  • The legal basis for the processing (typically Art. 6(1)(b) GDPR — performance of a contract).
  • For providers outside the EU/EEA: the mechanism used for the third-country transfer (EU–US DPF, SCCs, etc.).

License

MIT